WO2023069635A1 - Vehicle prognostics utilizing psuedonymous logging and directives - Google Patents
Vehicle prognostics utilizing psuedonymous logging and directives Download PDFInfo
- Publication number
- WO2023069635A1 WO2023069635A1 PCT/US2022/047300 US2022047300W WO2023069635A1 WO 2023069635 A1 WO2023069635 A1 WO 2023069635A1 US 2022047300 W US2022047300 W US 2022047300W WO 2023069635 A1 WO2023069635 A1 WO 2023069635A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- vehicle
- vehicles
- directives
- prognostication
- data
- Prior art date
Links
- 238000000034 method Methods 0.000 claims description 83
- 230000008569 process Effects 0.000 claims description 64
- 230000005540 biological transmission Effects 0.000 claims description 52
- 230000015654 memory Effects 0.000 claims description 37
- 238000004422 calculation algorithm Methods 0.000 claims description 33
- 230000004044 response Effects 0.000 claims description 26
- 238000012549 training Methods 0.000 claims description 13
- 230000008439 repair process Effects 0.000 claims description 12
- 238000012544 monitoring process Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 abstract description 62
- 230000006854 communication Effects 0.000 abstract description 62
- 208000018777 Vulvar intraepithelial neoplasia Diseases 0.000 abstract description 25
- 239000003981 vehicle Substances 0.000 description 686
- 238000012545 processing Methods 0.000 description 75
- 238000007726 management method Methods 0.000 description 49
- 230000009471 action Effects 0.000 description 44
- 230000003993 interaction Effects 0.000 description 21
- 230000007246 mechanism Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 15
- 238000010801 machine learning Methods 0.000 description 15
- 238000012790 confirmation Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 9
- 230000001360 synchronised effect Effects 0.000 description 9
- 230000006399 behavior Effects 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 238000012986 modification Methods 0.000 description 7
- 230000000977 initiatory effect Effects 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 230000000875 corresponding effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 239000010705 motor oil Substances 0.000 description 4
- 230000000153 supplemental effect Effects 0.000 description 4
- 238000012384 transportation and delivery Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 238000009825 accumulation Methods 0.000 description 3
- 238000003491 array Methods 0.000 description 3
- 238000013528 artificial neural network Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012512 characterization method Methods 0.000 description 3
- 239000012530 fluid Substances 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000002596 correlated effect Effects 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000003066 decision tree Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000002405 diagnostic procedure Methods 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000007257 malfunction Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000003490 calendering Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000007621 cluster analysis Methods 0.000 description 1
- 238000002485 combustion reaction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000013527 convolutional neural network Methods 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000779 depleting effect Effects 0.000 description 1
- 230000002542 deteriorative effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000003064 k means clustering Methods 0.000 description 1
- 238000012417 linear regression Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 229910052751 metal Inorganic materials 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000013488 ordinary least square regression Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000000513 principal component analysis Methods 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 238000007637 random forest analysis Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000000779 smoke Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 239000000725 suspension Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
Definitions
- a computing device can request content from another computing device via the communication network.
- a user at a personal computing device can utilize a browser application to request a content page (e.g., a network page, a Web page, etc.) from a seiver computing device via the network (e.g., the Internet).
- a content page e.g., a network page, a Web page, etc.
- the user computing device can be referred to as a client computing device and the server computing device can be referred to as a content provider.
- the user computing device can collect or generate information and provide the collected information to a server computing device for further processing or analysis.
- a variety of vehicles can be configured to collect information regarding the vehicle.
- a service provider may wish to access operation parameters, sensor values, or other vehicle information, such as monitoring or calculating vehicle performance characteristics.
- a service provider may wish to contact one or more vehicle users or owners to request the implementation of an action.
- FIG. 1 depicts a block diagram of an illustrative environment for providing vehicle communication with a network service in accordance with one or more aspects of the present application
- FIG.2 illustrates an environment that corresponds to vehicles in accordance with one or more aspects of the present application
- FIG. 3 A depicts an illustrative architecture for implementing a management component in accordance with aspects of the present application
- FIG. 3B depicts an illustrative architecture for implementing a vehicle data service in accordance with aspects of the present application
- FIG. 4 is a block diagram of the illustrative environment of interactions between the network service and an individual vehicle for the creation of pseudonyms according to an embodiment
- FIG. 5 is a block diagram of the illustrative environment of interaction between the network service and an individual vehicle for transmission of vehicle data based on one or more pseudonymous identifiers according to an embodiment
- FIG. 6A is a block diagram of the illustrative environment of interaction between the network service and an individual vehicle for transmission of vehicle directives according to an embodiment
- FIG. 6B is a block diagram of the illustrative environment between the network service and an individual vehicle for processing vehicle data and the subsequent transmission of vehicle directives according to one or more pseudonymous identifiers;
- FIG. 7 is a block diagram of the illustrative environment of the interaction of an alternative embodiment between the network sendee 120 and a computing device 130 for transmission of vehicle directives;
- FIG. 8 is a flow chart describing a routine for a vehicle pseudonym management according to one or more embodiments as disclosed herein;
- FIG. 9 is a flow chart describing a routine for a vehicle data transmission according to one or more embodiments as disclosed herein; processing according to one or more embodiments as disclosed herein; and
- FIG. 11 is a flow chart describing a routine for a vehicle directive request processing according to one or more embodiments as disclosed herein.
- aspects of the present disclosure relate to the configuration and management of actions implemented by vehicles based on vehicle data.
- vehicle data can include, but is not limited, vehicle operational information, vehicle parameters, sensor configuration information, sensor values, environmental information, and the like.
- aspects of the present application correspond to management of actions or directives implemented by a select subset of vehicles based on a communications generated by a network service provider.
- aspects of the present application also incorporate vehicle data processing to conduct prognostication of vehicle status, errors, or states or otherwise characterize such status, errors or states as part of vehicle maintenance or repair.
- a network service receives the vehicle data and performs prognostication of the vehicle.
- VIN numbers for vehicles are also associated with individual information of a registered owners. Accordingly, in such implementations, a close association of VIN numbers to a vehicle is required such that a service provider receiving vehicle data associated with a VIN is able to closely associate all received operational and performance data to an individual user.
- VIN numbers with vehicle data reporting and processing does not provide for privacy protection because the ATN is known to both the service provider and the vehicle and further associated with an owner. Such event that one or more vehicles need to be serviced, a service provider may need to identify information about vehicles.
- a network sei v ice provider can facilitate the management of data communications between a selected vehicle and remote service utilizing pseudonymous identifiers.
- a pseudonymous identifier can correspond to at least a semi-unique identifier generated by a vehicle or configured on a vehicle. The generation/configuration of the pseudonymous is implemented in a manner that the network service provider does not associate any additional identifiers, such as VINs, associated with the vehicle, vehicle owner, vehicle user, etc.
- individual pseudonymous identifiers represent a logical, generic identifier for individual vehicles that may be transmitted and processed without association with any vehicle identification or user identification information.
- a vehicle can include network communications functionality that can establish bi-directional communications with the network service. Individual vehicles generate/ configure the pseudonymous identifier(s) and register with the network service. Thereafter, vehicles can collect and transmit vehicle data (e.g., performance metrics, operational status, sensor values, etc.) associated with the pseudonymous identifiers.
- vehicle data e.g., performance metrics, operational status, sensor values, etc.
- the network service provider in return, can receive the vehicle data for a plurality of vehicles without the necessary information to be able to identify any particular source of vehicle data (e.g., a specific VIN or other identifier) other than a pseudonymous identifier.
- the network service provider can then make the collected vehicle data available for processing, such as diagnostic processing, use processing, and the like.
- the network service can utilize machine learning or other data processing techniques to identify vehicles with specific attributes, such as vehicles having attributes that can be characterized as likely to fail or likely to require servicing.
- attributes can include, but are not limited to, accumulated usage/wear/damage, rate of usage/wear/damage accumulation, malfunctions, failures, indicators of pending malfunctions, and the like.
- machine learning or data processing techniques include, but are not limited to, neural networks, physics-based models, stochastic models and methods, a statistical analysis models, and the like.
- the network service provider may receive an action request that attempts to elicit a service request or execution of a diagnostic/corrective process for vehicles satisfying selection criteria.
- the network service provider may receive an action request that attempts to provide a notification to users/owners of vehicles satisfying selection criteria.
- the network service cannot directly transmit communications to the target vehicles, such as via a direct communication, because the collected data satisfying the selection criteria is only associated with the pseudonymous identifier. Accordingly, the network service provider can publish a vehicle directive that corresponds to a list of pseudonyms that are requested to implement some responsive action.
- individual vehicles are configured to poll the published vehicle directive list by pseudonym and determine whether any of the listed pseudonyms match the individual vehicle’s pseudonym. If so, the vehicle can cause the implementation of a responsive action. For example, the vehicle can generate communications to the network sendee provider with additional information or requesting additional instructions. The additional information or transmission may omit the pseudonym identifier so that the network sendee provider cannot correlate the matching pseudonym identifier to the additional transmission.
- the additional information can include vehicle VIN information or other identifiers that allow the service provider to conduct further processing to identify corrective actions or other servicing responsive to identified selection criteria. Any remaining vehicle VINs that have not implemented the corrective actions or other servicing is notified or issued responsive commands. Additionally, sendee technicians can also be provided notifications regarding the suggested corrective actions. Still, further, the network service may interact with one or more computing devices, such as mobile devices, associated with users of the vehicle to provide notifications, additional information, or other information.
- the network service by utilizing the vehicle data, can perform vehicle prognostication and provide to the vehicle as directives.
- the network service may process the vehicle data and prognosticate that the vehicle is likely wall have a mechanical issue. For example, if the vehicle data indicates that there is a communication failure in the vehicle CAN communication, the network sendee may another example, if the vehicle data indicates that the vehicle’s electronic component is frequently malfunctioned, the network service may prognosticate that the 12V battery installed in the vehicle needs to be replaced.
- the prognostication can be performed by utilizing a machine learning component.
- the machine learning component can include various algorithms to perform the prognostication and training algorithms to tram the machine learning component.
- the training algorithm may monitor the log file of the vehicle prognostication and any vehicle that performed the corrective actions and retrain the prognostication algorithms accordingly.
- the prognostication can be performed by grouping vehicles based on criteria.
- the criteria can be based on number of vehicles having the same or similar concerns, and these vehicles can be grouped together. For example, if the criteria are the number of vehicles, such as 100 vehicles, the network service may group these vehicles and perform the prognostication.
- the network service may monitor the vehicle data received from a group and perform the prognostication. For example, if a group of vehicles indicates that these vehi cles’ batery is depleting faster than other vehi cles not in the group, the network service may monitor each vehicle data received from the group of the vehicles. If one or more of the vehicles in the group had serious issues, even though the number of vehicles in the group does not meet the criteria, the network sendee may perform the prognostication and provide the result to the user of the vehicles in the group.
- the system 100 can comprise a network, the network connecting a set of vehicles 110, a network service 120, and computing devices 130.
- the components may correspond to software modules implemented or executed by one or more external computing devices, which may be separate stand-alone external computing devices. Accordingly, the components of the network service 120 should be considered as a logical representation of the service, not requiring any specific implementation on one or more external computing devices.
- Network 150 can connect the devices and modules of the system.
- the network can connect any number of devices.
- the vehicles 110, the network service 120, and the computing devices 130 can communicate or exchange data (e.g., the establishment of one or more communication channels) via the network 150.
- the network service 120 provides network- based sendees to the vehicles 110, and the computing devices 130 via the network 150.
- the network service 120 can implement network-based services and refers to a large, shared pool of network- accessible computing resources (such as compute, storage, or networking resources, applications, or services), which may be virtualized or bare-metal.
- the network service 120 can provide on-demand network access to a shared pool of configurable computing resources that can be programmatically provisioned and released in response to customer commands. These resources can be dynamically provisioned and reconfigured to adjust to the variable load.
- the concept of “cloud computing” or “network-based computing” can thus be considered as both the applications delivered as sendees over the network and the hardware and software in the network sendee that provides those sendees.
- the network 150 can be secured networks, such as a local area network that communicates securely via the Internet with the network service 120.
- the network 150 may include any wired network, wireless network, or combination thereof.
- the network 150 may be a personal area network, local area network, wide area network, over-the-air broadcast network (e.g., for radio or television), cable network, satellite network, cellular telephone network, or combination thereof.
- the network 150 may be a publicly accessible network of linked networks, possibly operated by various distinct parties, such as the Internet.
- the network 150 may be a may include one or more wireless networks, such as a Global System for Mobile Communications (GSM) network, a Code Division Multiple Access (CDMA) network, a Long Term Evolution (LTE) network, a 5G (5 generation wireless communication), or any other type of wireless network.
- GSM Global System for Mobile Communications
- CDMA Code Division Multiple Access
- LTE Long Term Evolution
- 5G 5 generation wireless communication
- the network 150 can use protocols and components for communicating via the Internet or any of the other aforementioned types of networks.
- the protocols used by the network 150 may include Hypertext Transfer Protocol (HTTP), HTTP Secure (HTTPS), Message Queue Telemetry Transport (MQTT), Constrained Application Protocol (CoAP), and the like. Protocols and components for communicating via the Internet or any of the other aforementioned types of communication networks are well known to those skilled in the art and, thus, are not described in more detail herein.
- each individual vehicle 110 is connected with a computing device 130 and a network 160.
- the network 160 comprises any combination of wired and/or wireless networks, such as one or more direct communication channels, local area network, wide area network, personal area network, and/or the Internet, for example.
- the communication between the vehicles 110 and the computing devices 130 may be performed via a short-range communication protocol, such as Bluetooth, Bluetooth low' energy (“BLE”), and/or near field communications (“NFC”),
- the network 160 can be utilized as a backup network for the network 150.
- the communication can be performed by utilizing a network between computing device 130 and network service 120.
- the vehicle data can be periodically synchronized by utilizing the network 160.
- each computing device 130 can establish the network 160 with more than one vehicles 1 10.
- the networks 150, 160 may include some or all of the same communication protocols, services, hardware, etc.
- the discussion herein may describe communication between the vehicles 110 and the computing devices 140 via the network 160 and communication between the vehicles 110, the network service 120, the third party service providers 130, and the computing devices 140 can occur via the network 150, communications of the devices and/or the network bases services are not limited in this present application is not limited thereto.
- the computing device 130 (e.g., also referred to as a user device) can be any computing device such as a desktop, laptop or tablet computer, personal computer, tablet computer, wearable computer, server, personal digital assistant (PDA), hybrid PDA/mobile phone, mobile phone, smartphone, set top box, voice command device, digital media player, and the like.
- the computing device 130 may execute an application (e.g., a browser, a stand-alone application, etc.) that allows a user to access interactive user interfaces, view images, analyses, or aggregated data, and/or the like as described herein.
- the users of the computing devices 130 may interact with the vehicle and/or network service via various devices. Such interactions may typically be accomplished via interactive graphical user interfaces or voice commands, however, alternatively such interactions may be accomplished via command line, and/or other means.
- the network service 120 can include a vehicle data service 122 that can provide functionality responsive to data received from the vehicles 110 and/or computing devices 130 as applied to aspects of the present application.
- the vehicle periodically transmits the vehicle data with pseudonymous identifier(s) associated with particular vehicle to the vehicle data service 122.
- the vehicle data service 122 can process the vehicle data, received from the vehicles and provide directives.
- the vehicle data service 122 receives the vehicle data from a plurality of vehicles 110, where each vehicle is associated with a pseudonymous identifier. Then, the vehicle data service 122 processes the vehicle data and posts directives with the pseudonymous identifier for each directive.
- the network service 120 may further include a vehicle data store 124 configured to store the processed data and/or received vehicle data from the plurality of data.
- the vehicle data store 124 can include any computer-readable storage medium and/or device (or collection of data storage mediums and/or devices). Examples of data stores include, but are not limited to, optical disks (e.g., CD-ROM, DVD-ROM, etc.), magnetic disks (e.g., hard disks, floppy disks, etc.), memory circuits (e.g., solid state drives, random-access memory (RAM), etc. ), and/or the like.
- Another example of a vehicle data store 124 is a hosted storage environment that includes a collection of physical data storage devices to as “cloud” storage).
- the network service is represented in a simplified, logical form and does not reflect all of the physical software and hardware components that may be implemented to provide the functionality associated with the network service.
- Each of the vehicles HO can include communication functionality, including hardware and software, that facilitate interaction via one of a plurality of communication mediums and communication protocols. More specifically, the vehicles include a plurality of sensors, components, and data stores for obtaining, generating, and maintaining vehicle data, including operational data.
- the information provided by the components can include processed information in which a controller, logic unit, processor, and the like has processed sensor information and generated additional information, such as a vision system that can utilize inputs from one or more camera sensors and provide outputs (e.g., processing of raw camera image data and the generation of outputs corresponding to the processing of the raw camera image information).
- the camera sensor may be the sensor component that is associated with vision systems for determining vehicle operational status, environmental status or other information.
- the camera sensors can be separate from the sensor components, such as for non-camera sensor components or vehicles having multiple camera sensors.
- a control component can utilize additional information obtained from, or otherwise associated with, positioning systems, calendaring systems, or time-based systems.
- FIG. 2 illustrates an environment that corresponds to vehicles 110 in accordance with one or more aspects of the present application.
- Individual vehicles illustratively include a management component 210 that is operable to implement one or more aspects of the present application as described herein.
- the management component 210 can generate or configure pseudonymous identifier(s) that will be utilized to identify the vehicle by the network service.
- the pseudonymous identifier can correspond to any one of a variety of unique or semi-unique identifiers.
- the pseudonymous identifier may be based on attributes of the vehicle, such as representation of specific hardware or software components.
- a pseudonymous identifier may be selected from a list of available pseudonymous identifiers, such as random selection.
- the generation or configuration of the pseudonymous kauitifier(s) may take place at time of more vehicles are represented generally as a single component, but would include some portion of the functionality described and illustrated with other vehicles.
- the environment of the vehicle 110 can include sensors 212 that can provide inputs for the operation of the vehicle or collection of information as described herein.
- the collection of sensors 212 can include one or more sensor or sensor-based systems included with a vehicle or otherwise accessible by a vehicle during operation.
- the sensors 212 may be integrated into the vehicle.
- the sensors 212 may be provided by interfaces associated with a vehicle, such as physical connections, wireless connections, or a combination thereof.
- the sensors 212 can include vision systems that provide inputs to the vehicle, such as detection of objects, attributes of detected objects (e.g., position, velocity, acceleration), presence of environment conditions (e.g., snow, rain, ice, fog, smoke, etc.), and the like.
- the vehicle 110 may include a plurality of sensors 212 (including cameras, operational sensors, etc.), a management component 210, and data store 214.
- the sensors 212 may provide the vehicle operational parameters to the management component 210 in real time or near real time.
- the management component 210 may provide data related to controlling the vehicle, such as steering wheel direction, acceleration, braking, etc.
- the data store 214 may store information related to the current vehicle operational environment.
- vehicles 1 10 can rely on such vision systems for defined vehicle operational functions without assistance from or in place of other traditional detection systems.
- the sensors 212 can further include one or more positioning systems that can obtain reference information from external sources that allow for various levels of accuracy in determining positioning information for a vehicle.
- positioning systems can include various hardware and software components for processing information from GPS sources, Wireless Local Area Networks (WLAN) access point information sources, Bluetooth information sources, radio-frequency identification (RFID) sources, and the like.
- the positioning systems can obtain combinations of information from multiple sources.
- the positioning systems can obtain information from various input sources and determine positioning information for a vehicle, also determine travel-related operational parameters, such as the direction of travel, velocity, acceleration, and the like.
- the positioning system may be configured as part of a vehicle for multiple purposes, including self-driving applications, enhanced driving or user-assisted navigation, and the like.
- the positioning systems can include processing components and data that facilitate the identification of various vehicle parameters or process information.
- the sensors 212 can include one or more navigations system for identifying navigation related information.
- the navigation systems can obtain positioning information from positioning systems and identify characteristics or information about the identified location, such as elevation, road grade, etc.
- the navigation systems can also identify suggested or intended lane locations in a multi-lane road based on directions that are being provided or anticipated for a vehicle user. Similar to the location systems, the navigation system may be configured as part of a vehicle for multiple purposes, including self-driving applications, enhanced driving or user-assisted navigation, and the like,
- the local resources further include one or more management component(s) 210 that may be hosted on the vehicle 110 or a computing device 130 accessible by a vehicle (e.g., a mobile computing device).
- the management component(s) 210 can illustratively access inputs from various sensors 212 and process the inputted data and store the processed data.
- the management component(s) 210 will be described with regard to one or more functions related to illustrative aspects.
- the management component 210 may generate or configure the pseudonymous identifier byassociating with the vehicle data generated from the plurality of sensors 212.
- the management component 210 may communicate with the computing device 130 and network service 120 via the communication 216.
- the environment can further include various additional sensor components or sensing systems operable to provide information regarding various operational parameters for use in accordance with one or more of the operational states.
- the environment can further include one or more control components for processing outputs, such as the transmission of data through a communications output, the generation of data in memory, the transmission of outputs to other processing components, and the like.
- implementing the management component 210 on a vehicle 110 will be described.
- the management component 210 may be part of components/systems that can provide functionality associated with generating or configuring the pseudonymous identifier(s) and processing and managing the vehicle data to be further used in the network service.
- the management component 210 may further configured to identify directives generated from the network service and perform one or more corrective actions based on the directive.
- FIG. 3A The architecture of FIG. 3A is illustrative in nature and should not be construed as requiring any specific hardware or software configuration for the management component 210.
- the general architecture of the management component 210 is depicted in FIG. 3 A includes an arrangement of computer hardware and software components that may be used to implement aspects of the present disclosure.
- the management component 210 can include a processing unit 302, a network interface 308, a computer readable medium drive 306, and an input/output device interface 304, all of which may communicate with one another by way of a communication bus.
- the components of the management component 210 may be physical hardware components that can include one or more circuitries and software models,
- the network interface 308 may provide connectivity to one or more networks or computing systems, such as the networks 150, 160 of FIG. 1 .
- the processing unit 302 may thus receive information and instructions from other computing systems or services via a network.
- the processing unit 302 may also communicate to and from memory 310 and further provide output information via the input/output device interface.
- the management component 210 may include more (or fewer) components than those shown in FIG. 3 A.
- the memory 310 may include computer program instructions that the processing unit 302 executes in order to implement one or more embodiments.
- the memory 310 generally includes RAM, ROM, or other persistent or non-transitory memory.
- the memory 310 may store an operating system 314 that provides computer program instructions for use by the processing unit 302 in the general administration and operation of the management component 210.
- the memory 310 may further include computer program instructions and other information for implementing aspects of the present disclosure.
- component 316 The pseudonymous identifier(s) management component 316 can be configured to generate or configure the pseudonymous identifiers) by associating with the vehicle data.
- the individual pseudonymous identifiers represent a logical, generic identifier for individual vehicles that may be transmitted and processed without association with any vehicle identification or user identification information.
- the pseudonymous identifier can correspond to any one of a variety of unique or semi-unique identifier.
- the pseudonymous identifier may be based on attributes of the vehicle, such as representation of specific hardware or software components.
- a pseudonymous identifier may be selected from a list of available pseudonymous identifiers, such as random selection.
- the generation or configuration of the pseudonymous identifier(s) may take place at time of manufacture, release from the manufacturer, and the like.
- the pseudonymous identifies may be associated with encryption mechanisms or other security mechanism to prevent modification or corruption of the pseudonymous identifier by a user or external sendee.
- the pseudonymous identifier(s) management component 316 process the vehicle data by adding the pseudonymous identifier corresponding to the vehicle. For example, the pseudonymous identifier(s) management component 316 may add the pseudonymous identifier for each segment of the vehicle data or group of the vehicle data. In one embodiment, the pseudonymous identifier(s) is automatically added to the vehicle data, when the vehicle transmits the vehicle data to network service. In some embodiments, the pseudonymous identifier(s) management component 316 may generate a new pseudonymous identifiers) associated with the vehicle.
- a vehicle manufacturer, administrators, or owner may request to replace the pseudonymous identifier(s) with a new identifier(s). For example, if the existing pseudonymous identifier(s) information is released to the public, the vehicle owner may request to reset the pseudonymous identifier(s).
- the pseudonymous identifier(s) management component 316 may generate a new identifier or receive a new identifier from the vehicle manufacturer (e.g., the vehicle manufacturer’s authorized service facility, technician, or administrators).
- the pseudonymous identifiers ) management component 316 may keep track of the previous pseudonymous identifier(s) by associating the identifiers ) to the new pseudonymous identifier(s).
- component 316 may identify any vehicle activity (e.g., service activity) performed with the vehicle’s VIN number. For example, if a vehicle changes a brake fluid and the brake fluid record is stored with the vehicle’s VIN number, the pseudonymous identifiers) management component 316 may associate the brake fluid history with the pseudonymous identifier(s) of the vehicle.
- the pseudonymous identifier(s) management component 316 may identify the vehicle activity based on searching a public record of the vehicle’s VIM. In some embodiments, the pseudonymous identifier(s) management component 316 may associate the pseudonymous identifier(s) with one or more vehicle service requests, history, or parts. For example, if the vehicle ordered a new part, the pseudonymous identifier(s) management component 316 may associate the new part with the vehicle’ s pseudonymous identifier(s). The type or number of vehicle activity or service is not limited by this present disclosure.
- the memory 310 may further include a vehicle data management component 318.
- the vehicle data management component 318 can collect vehicle data.
- the vehicle data can include but is not limited to the vehicle’s performance metrics, operational status, sensor values, location information, etc.
- the vehicles include a plurality of sensors, components, and data stores for obtaining, generating and maintaining vehicle data, including operational data.
- the collection and processing of vehicle data may be based on programed configuration data, manual input from a user, or responsive to requests from the network service.
- the memory 310 may further include a directive identification component 320.
- the directive identification component. 320 can be configured to identify one or more directives issued by the network service.
- the directives can include commands that, need to be executed by the vehicle in response, such as diagnostic, repair, or updating processes.
- the directive identification component 320 can collect and process the published/posted vehicle directives.
- the directive identification component 320 may identify directives corresponding to the vehicle by attempting to match the vehicle’s specific pseudonymous identifier with any of the pseudonymous identifiers associated with the vehicle directive. If the directive identification component 320 does not match the vehicle’s specific pseudonymous identifier, the vehicle directive can be disregarded. 322.
- the directive processing component 322 can process the published/posted vehicle directives associated with the pseudonymous identifiers of the vehicle. In some embodiments, processing the vehicle directive can elicit a number of responsive actions by the vehicle. In one aspect, directives can include commands that are executed by the vehicle in response, such as diagnostic, repair or updating processes. The one or more actions may be considered mandatory or optional. In another aspect, the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of notification for scheduling a service call. Still, further, the vehicle can also transmit confirmations, status, or notifications as requested or if the vehicle is preconfigured to transmit confirmation, status or notification communications.
- the directive processing component 322 by processing the directives, categorizes the directives based on priority, type of required action (e.g., mandatory , optional, urgent, etc.), etc.
- the directive processing component 322 may further provide one or more instructions or recommendations to the vehicle owner or driver based on the processing result of the directives.
- the vehicle data service 122 may be part of components/ systems that can provide functionality associated with the vehicle 110 and/or computing devices 130.
- the vehicle data service 122 can be configured to receive the vehicle data periodically and issue the vehicle directives based on processing the vehicle data.. Based on the processing result of the vehicle data., the vehicle data service 122 can be configured to post the vehicle directives with the list of pseudonym identifiers.
- the vehicle data service 122 also can be configured to perform vehicle prognostication or characterization based on processing vehicle data.
- FIG. 3B The architecture of FIG. 3B is illustrative in nature and should not be construed as requiring any specific hardware or software configuration for the vehicle data service 122.
- the general architecture of the vehicle data service 122 is depicted in FIG. 3B includes an arrangement of computer hardware and software components that may be used to implement aspects of the present disclosure.
- the vehicle data service 122 includes a processing unit 342, a network interface 348, a computer readable medium drive 346, and an input/output device interface 344, all of which may communicate with one another physical hardware components that can include one or more circuitries and software models.
- the network interface 348 may provide connectivity to one or more networks or computing systems, such as the networks 150, 160 of FIG. I.
- the computing device 140 may thus receive information and instructions from other computing systems or services via a network.
- the vehicle data service 122 may also communicate to and from memory 350 and further provide output information via the input/output device interface.
- the vehicle data service 122 may include more (or fewer) components than those shown in FIG. 3B.
- the memory 350 may include computer program instructions that the processing unit 342 executes in order to implement one or more embodiments.
- the memory 350 generally includes RAM, ROM, or other persistent or non-transitory memory.
- the memory 350 may store an operating system 352 that provides computer program instructions for use by the processing unit 342 in the general administration and operation of the vehicle data service 122.
- the memory 350 can include a directive identification component 354.
- the directive identification component 354 may receive a request for issuance of a vehicle directive by pseudonym.
- a vehicle directive corresponds to one or more actions and associated parameters that will be elicited by the directive identification component 354 upon receipt.
- the directives can include commands that are executed by the vehicle in response, such as diagnostic, repair, or updating processes.
- the one or more actions may be considered mandatory or optional.
- vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of notifications for scheduling a sendee call.
- the directive identification component 354 processes the vehicle directive request.
- the directive identification component 354 can validate that the request for vehicle data is permitted, such as via authentication or authorization mechanisms.
- the received request may not explicitly identify the pseudonymous identifiers of interest but provides selection criteria (e.g., all vehicles having a mileage exceeding 100,000 miles).
- the directive identification component 354 can query the stored vehicle data to identify the appropriate pseudonymous identifiers pseudonymous identifiers that do not exceed a size threshold, the network service can reject the request, ask for additional criteria, or include additional pseudonymous identifiers to the set.
- having a set of pseudonymous identifiers exceeding one or more thresholds can mitigate the potential network service, individual or third party can iteratively match a VIN or other identification information with a specific pseudonymous identifier.
- the memory 350 can further include the directives posting component 356.
- the directives posting component 356 can post the vehicle directive request that identifies a set of pseudonymous identifiers that have been requested to implement the directive request.
- the directives posting component 356 does not need to actively transmit the vehicle directive requests to each vehicle or include processing mechanisms that specifically identify contact mechanism (e.g., network addresses) for each pseudonymous identifier. Rather, individual vehicles will independently contact the network service for the published list of pseudonymous identifiers and vehicle directives.
- the directives posting component 356 posts vehicle directives with the list of pseudonym identifiers.
- the individual vehicles do not need to be configured to transmit the request at the same time.
- the transmi ssion of the request can be randomized or implemented with a range of times (e.g., anytime throughout a day) such that the transmission of requests can be distributed in a manner to lessen the requirements for network processing resources by the network service.
- the directives posting component 356 can provide the published/posted vehicle directives and associated set of pseudonymous identifiers. This can include an identification of the full list of pseudonymous identifiers or some delayeded/filtered subset of pseudonymous identifiers.
- the vehicle may transmit the pseudonymous identifier(s) of interest, and the directives posting component 356 can then determine whether a match occurs.
- the network service can then respond with a notification or confirmation.
- This embodiment can minimize the amount of data transmitted between the network service and the vehicle and also reduce the impact on the vehicle’s processing resources to process a list to identify potential matches.
- the network request component 358 can collect network performance information, such as the network bandwidth, or by predefined rules in accessing vehicle data, such as predefined bidirectional data communication protocol. In some embodiments, the network request component 358 may identify the timing of initiating a communication with a vehicle.
- the timing of initiating the communication can be the timing of requests for vehicle data from the vehicle.
- the network request component 358 may monitor network performance information to determine the timing of initiating requests for vehicle data, what vehicle data is requested, and the like. For example, the network request component 358 may utilize the collected network performance information to determine when vehicle data requests may be initiated. In another example, the network request component 358 may utilize network performance information to select or filter between different requested information during times of lower quality (relative) network conditions, such as selecting higher priority information. In a further example, the network request component 358 may implement different timing or spacing for data transmission in scenarios in which the network conditions are experiencing higher variability in quality or may be characterized as experiencing deteriorating conditions.
- network performance information can include, but is not limited to, available bandwidth, latency measurements, transmission error rates, and the like.
- the network request component 358 in response to detecting that the network performance degradation, may configure a secondary network communication path with the computing device 130.
- the vehicle and the network service may initially communicate via the network 150.
- the network request component 358 may automatically connect to the computing device 130 associated with the vehicle 110.
- the network request component 358 can determine an initial communication path between the vehicle and network service or between the computing device and the network sendee. For example, the network request component 358 may establish an initial communication path with one of the computing device and the vehicle based on criteria. The criteria can be based on the timing of response received at the network response from the vehicle before the computing device, the network request component 358 may establish the initial communication path between the vehicle and the network service. The criteria also can be based on network performance monitoring results. For example, the network request component 358 may compare the network performances of the network connection with the vehicle and computing device.
- the memory 350 can further include a prognostication component 360.
- the prognostication component 360 can be configured to prognosticate the vehicles, based on processing the vehicle data received from the plurality of vehicles 110.
- the prognostication component 360 process the individual vehicle’s data and provide prognostication results. For example, if an individual vehicle data is indicating that the number of wheel spin in the vehicle is higher than other similar vehicles, the prognostication component 360 may prognosticate that the vehicle may need to rotate the tire or change tires wither shorter period than other similar vehicles.
- the prognostication result can be provided to the vehicle user (e.g., owner, driver, administrator, etc.) as directives associated with the vehicle’s pseudonymous identifier.
- the prognostication result can be a recommendation to the vehicle user. For example, if a certain vehicle’s batery is depleted more rapidly than other similar vehicles and that the vehicle data indicates that the vehicle’s interior lights is frequently on during night times, the prognostication component 360 may provide a recommendation, such as to check the vehicle interior light before leaving the vehicle.
- the prognostication component 360 can perform the prognostication based on criteria.
- the criteria can be a number of vehicles having similar or same issues in their vehicle data.
- the prognostication component 360 may collect 100 vehicles having issues related to a component, such as 12V battery or battery systems.
- the prognostication component 360 may prioritize the groups.
- the prognostication component 360 may prioritize a group of vehicles having issues related to safety as a high priority group than other groups of vehicles having issues with other features or components that may not be related to safety.
- a group of vehicles having issues with braking systems may have a higher priority than another group of vehicle having an issue with HVAC systems or entertainment systems.
- the priority also can have a higher priority than another group, including 100 vehicles.
- prognostication component 360 may monitor the vehicle data of the vehicles in the group. In this embodiment, if one or more vehicles’ data indicates an urgent corrective action, the prognostication component 360 may provide the prognostication results to the vehicle user, even though group does not meet the grouping criteria that triggers the prognostication. For example, if a set of vehicles may be grouped based on common or related braking systems and that one of the vehicle in the group has an brake failure, the prognostication component 360 may provide the prognostication results to the vehicles (and all associated users) in the group, even though the group does not meet the grouping criteria.
- the number of vehicles in the grouping criteria and the criteria for prioritizing the groups are not limited in present application, and the number of vehicles and the prioritizing criteria can be determined based on specific application.
- the memory 350 can further include a machine learned component 362.
- the machine learned component 362 can be configured to perform the prognostication of the plurality' of vehicles.
- the machine learned component 362 monitors vehicle data of the plurality of vehicles, such as the vehicle data batch.
- the machine learned component 362 also reviews the prognostication result data, such as prognostication batch.
- the machine learned component 362 may include various of prognostication models and training models. Illustratively, the prognostication models can be trained by using the training models.
- the training model of the machine learned component 362 will train the prognostication models, such that if a specific vehicle communication is failed, the corrective action is diagnosing the MOSFET in the vehicle comm unication circui try .
- a number of different types of algorithms may be used by the machine learning component 362 to generate the models.
- certain embodiments herein may use a logistical regression model, decision trees, random forests, convolutional neural networks, deep networks, or others.
- other models are possible, such as a linear regression model, a discrete choice model, or a generalized linear model.
- the machine learning algorithms can be configured to adaptively develop and update the models the models can be regenerated on a periodic basis as new human physical characteristic or bio information is available to help keep the predictions in the model more accurate as the information evolves over time.
- the machine learning component 362 is described in more detail herein.
- Some non-limiting examples of machine learning algorithms that can be used to generate and update the parameter functions or prediction models can include supervised and non-supervised machine learning algorithms, including regression algorithms (such as, for example, Ordinary Least Squares Regression), instance-based algorithms (such as, for example, Learning Vector Quantization), decision tree algorithms (such as, for example, classification and regression trees), Bayesian algorithms (such as, for example, Naive Bayes), clustering algorithms (such as, for example, k-means clustering), association rule learning algorithms (such as, for example, Apriori algorithms), artificial neural network algorithms (such as, for example, Perceptron), deep learning algorithms (such as, for example, Deep Boltzmann Machine), dimensionality reduction algorithms (such as, for example, Principal Component Analysis), ensemble algorithms (such as, for example, Stacked Generalization), and/or other machine learning algorithms.
- regression algorithms such as, for example, Ordinary Least Squares Regression
- instance-based algorithms such as, for example, Learning Vector Quantization
- decision tree algorithms such as, for example, classification
- These machine learning algorithms may include any type of machine learning algorithm including hierarchical clustering algorithms and cluster analysis algorithms, such as a k-means algorithm.
- the performing of the machine learning algorithms may include the use of an artificial neural network.
- machine-learning techniques large amounts (such as terabytes or petabytes) of player interaction data may be analyzed to generate models.
- FIG. 4 an illustrative interaction between the network service and an individual vehicle for the creation of pseudonyms will be described. Although a set of interactions are illustrated, the present application is not limited to any particular number of vehicles interacting with the network service. Rather, in some embodiments, the number of interactions between individual vehicles and the network service will be a relatively large scale including and exceeding thousands of individual vehicles.
- the vehicles 110 can generate or configure pseudonymous identifier(s) that wall be utilized to identify the vehicle correspond to any one of a variety of unique or semi-unique identifiers.
- the pseudonymous identifier may be based on attributes of the vehicle 110, such as representation of specific hardware or software components.
- a pseudonymous identifier may be selected from a list of available pseudonymous identifiers, such as random selection.
- the generation or configuration of the pseudonymous identifier(s) may take place at time of manufacture, release from the manufacturer, and the like.
- the vehicle 110 can store the pseudonymous identifiers in a local memory for use in communications.
- the pseudonymous identifies may be associated with encryption mechanisms or other security mechanism to prevent modification or corruption of the pseudonymous identifier by a user or external service.
- the individual vehicles 110 can transmit pseudonym registrations with the network service 120 (such as vehicle data service 122).
- This process illustrates the first instantiation of the transmission of pseudonymous identifiers between the vehicles 110 and the network sendee 120.
- a vehicle 110 may be triggered to register with the network service 120 at various times or in response to triggering criteria, such as the delivery of the vehicle to a new owner.
- the timing of transmission of the pseudonym may be based on a seed value, such as a randomly generated number, so that the transmission of the pseudonyms does not closely relate to the delivery of the vehicle or timing of the generation of the pseudonym.
- the network service 120 process the registration data with the pseudonymous identifier.
- the network service 120 can instantiate one or more records, data stores, etc. based solely on the transmitted pseudonymous identifier and without further association with other identification information associated with the vehicle, such as a VIN or user identifiers.
- FIG. 5 an illustrative interaction between the network service 120 and an individual vehicle 110 for transmission of vehicle data based on one or more pseudonymous identifiers wall be described.
- the present application is not limited to any particular number of vehicle 110 interacting with the network service. Rather, in some embodiments, the number large scale including and exceeding thousands of individual vehicles 110.
- the vehicles 110 can collect vehicle data.
- the vehicles include a plurality of sensors, components, and data stores for obtaining, generating, and maintaining vehicle data, including operational data.
- the collection and processing of vehicle data may be based on programed configuration data, manual input from a user, or responsive to requests from the network service (not illustrated).
- the vehicle 110 can associate the previously stored pseudonymous identifiers maintained in local memory.
- the pseudonymous identifies and vehicle data may be associated with encryption mechanisms or other security mechanisms to prevent modification or corruption of the pseudonymous identifier by a user or external service.
- one or more of the vehicles 110 may synchronize the vehicle data with the computing device 130.
- the synchronization can be performed periodically or in real time.
- a part of data can be synchronized with the computing device 130, In these embodiments, the part of data can be defined or designated by a user, vehicle manufacturer, vehicle administrator, etc.
- the computing device 130 only get synchronized vehicle data related to engine oil management data.
- the computing device 130 may directly transmit the engine oil management data to the network service 120 by associating the data with the vehicle’s pseudonymous identifier.
- the process (3) can be an optional process.
- the individual vehicles can transmit vehicle data with the generated pseudonymous identifiers to the network service.
- the collection and transmission of vehicle data with associated pseudonymous identifiers can correspond to multiple transmissions. These transmissions may be scheduled on an individual vehicle basis or for groups of vehicles.
- a vehicle may be triggered to transmit vehicle data to the network service at various times or in response to triggering criteria, such as experiencing errors, specific sensor values, accumulation of threshold amounts of vehicle data, changes in vehicle data values, and the like.
- the network service processes the vehicle with the pseudonymous identifier.
- the network service can utilize the instantiated and without further association with other identification information associated with the vehicle, such as a VIN or user identifiers. Accordingly, the network service can illustratively receive detailed information about vehicles, including performance or operational parameters without having the necessary information to identify a particular vehicle or vehicle owner as providing (or associated with) the transmitted vehicle data.
- the computing device 130 can transmit the synchronized vehicle data to the network service 120.
- the computing device 130 and vehicle 110 can be periodically synchronized the vehicle data by utilizing the network 160, such as a short range data communication network.
- the computing device 130 may transmit the vehicle data to the network sendee 120.
- FIG. 6 A an illustrative interaction between the network service 120 and an individual vehicle 110 for transmission of vehicle directives according to one or more pseudonymous identifiers will be described.
- the present application is not limited to any particular number of vehicle 110 interacting with the network service 120. Rather, in some embodiments, the number of interactions between individual vehicles 110 and the network service 120 will be a relatively large scale including and exceeding thousands of individual vehicles.
- the network service 120 can process (or receive requests to process) the stored vehicle data by pseudonym.
- the network service 120 can analyze collected performance data to identify one or more actions that should be implemented by vehicles 110 associated with the pseudonymous identifiers.
- the network service 120 can implement diagnostic processes that identify potential hardware or software errors/failures indicated by the collected vehicle data.
- the network service 120 can utilize processing techniques that facilitate the grouping or organization of sets of vehicles 110 based on vehicle data, such as operational parameters, vehicle attributes, regions of operations, characterizations of use, and the like.
- the processing of the stored vehicle data may be omitted or implemented as a separate process and is not required herein.
- the prognostication component 360 can prognosticate the vehicles, based on processing the vehicle data received from the plurality of vehicles 110.
- the prognostication component 360 process the individual vehicle’s data and provide prognostication results. For example, if an individual vehicle data is indicating that the number of wheel spin in the vehicle is higher than other similar vehicles, the prognostication component 360 may prognosticate that the vehicle may need to rotate the tire or change tires wither shorter period than other similar vehicles.
- the prognostication result can be provided to the vehicle user (e.g., owner, driver, administrator, etc.) as directives associated with the vehicle’s pseudonymous identifier.
- the prognostication result can be a recommendation to the vehicle user.
- the prognostication component 360 may provide a recommendation, such as to check the vehicle interior light before leaving the vehicle.
- the prognostication component 360 can perform the prognostication based on criteria.
- the criteria can be a number of vehicles having similar or same issues in their vehicle data.
- the prognostication component 360 may collect 100 vehicles having issues related to the 12V battery.
- the prognostication component 360 may prioritize the groups.
- the prognostication component 360 may prioritize a group of vehicles having issues related to safety as a high priority group than other groups of vehicles having issues with vehicle’s convenient feature.
- a group of vehicles having issues with sensing systems for semi- autonomous driving or autonomous driving may have similar priority with headlight systems, but higher priority than another group of vehicle having an issue tire rotation.
- prognostication component 360 may monitor the vehicle data of the vehicles in the group. In this embodiment, if one or more vehicles’ data indicates an urgent corrective action, the prognostication component 360 may provide the prognostication results to the vehicle user, even though group does not meet the grouping criteria that triggers the prognostication. For example, if a group of vehicles are related with a common or similar suspension system and one of the vehicles in prognostication results to the entire group, even though the group does not meet the grouping criteria.
- the entire group may not receive prognostication results because the group does not meet the grouping criteria and the potential error has a lower associated priority.
- the number of vehicles in the grouping criteria and the criteria for prioritizing the groups are not limited in present application, and the number of vehicles and the prioritizing criteria can be determined based on specific application.
- the network service 120 can perform the prognostication of the plurality’ of vehicles.
- the machine learned component 362 monitors vehicle data of the plurality of vehicles, such as the vehicle data batch.
- the machine learned component 362 also reviews the prognostication result data, such as prognostication batch.
- the machine learned component 362 may include various of prognostication models and training models.
- the prognostication models can be trained by using the training models.
- the training model of the machine learned component 362 will tram the prognostication models, such that if a specific vehicle communication is failed, the corrective action is diagnosing the MOSFET in the vehicle communication circuitry.
- the network service 120 receives a request for issuance of a vehicle directive by pseudonym.
- a vehicle directive corresponds to one or more actions and associated parameters that will be elicited by a vehicle upon receipt.
- directives can include commands that are executed by the vehicle in response, such as diagnostic, repair or updating processes. The one or more actions may be considered mandatory or optional.
- the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of notification for scheduling a service call.
- the vehicle directives can include requests/ commands for transmission of additional or supplemental vehicle data to the network sendee 120 or a third party.
- the vehicle directive can include the transmission of identification information for a particular vehicle (e.g., VIN) and specific operational parameters that can the pseudonymous identifier may be omitted such that the network service 120 cannot associate the suppiementally provided vehicle identifiers with the pseudonymous identifier.
- the vehicle directive may include a list of specific vehicles that the network service 120 is interested in tracking as a subset of pseudonymous identifiers. Accordingly, the vehicle directive may request a return of a pseudonymous identifier in responsive to a matching VIN. In this regarding, if the subset of pseudonymous identifiers is sufficiently large, the service provider will not be able to determinatively associate any particular VIN to a pseudonymous identifier.
- the network service 120 processes the vehicle directive request.
- the network service 120 can validate that the request for vehicle data is permitted, such as via authentication or authorization mechanisms.
- the received request may not explicitly identify the pseudonymous identifiers of interest but provides selection criteria (e.g., all vehicles having a mileage exceeding 100,000 miles).
- the network service 120 can query the stored vehicle data to identify the appropriate pseudonymous identifiers correlated to the selection criteria.
- selection criteria result in a set of pseudonymous identifiers that do not exceed a size threshold
- the network service 120 can reject the request, ask for additional criteria, or include additional pseudonymous identifiers to the set.
- having a set of pseudonymous identifiers exceeding one or more thresholds can mitigate the potential network service 120, individual or third party can iteratively match a VIN or other identification information with a specific pseudonymous identifier.
- the network service 120 can post the vehicle directive request that identifies a set of pseudonymous identifiers that have been requested to implement the directive request.
- the network service 120 does not need to actively transmit the vehicle directive requests to each vehicle or include processing mechanisms that specifically identify contact mechanisms (e.g., network addresses) for each pseudonymous identifier. Rather, individual vehicles will independently contact the network service 120 for the published list of pseudonymous identifiers and vehicle directives.
- the individual vehicles 110 request the posted vehicle directives with the list of pseudonym identifiers.
- the individual vehicles do not need to be randomized or implemented with a range of times (e.g., anytime throughout a day) such that the transmission of requests can be distributed in a manner to lessen the requirements for network processing resources by the network service 120.
- the network service 120 can respond individually to each request.
- the network service 120 can provide the published/posted vehicle directives and associated set of pseudonymous identifiers. This can include an identification of the full list of pseudonymous identifiers or some sorted/filtered subset of pseudonymous identifiers.
- This approach requires the vehicle 110 to be able to match a pseudonymous identifier with the list of pseudonymous identifiers.
- the vehicle may transmit the pseudonymous identifier(s) of interest and the network service 120 can then determine whether a match occurs.
- the network service 120 can then respond with a notification or confirmation. This embodiment can minimize the amount of data transmitted between the network service 120 and the vehicle and also reduce the impact on the vehicle’s processing resources to process a list to identify potential matches.
- the vehicles 1 10 can collect and process the published/posted vehicle directives and associated set of pseud onymous identifiers.
- the vehicles process the published/posted vehicle directives and associated set of pseudonymous identifiers by atempting to match the vehicle’s specific pseudonymous identifier with any of the pseudonymous identifiers includes associated with the vehicle directive. If the vehicle does not match the vehicle’s specific pseudonymous identifier, the vehicle directive can be disregarded. Alternatively, for a subset of a vehicle matching a pseudonymous identifier, the vehicle can initiate or otherwise process the vehicle directive.
- the initiation of the vehicle directive can elicit a number of responsive actions by the vehicle, service providers), and/or users of the vehicle.
- directives can include commands that are executed by the vehicle in response, such as diagnostic, repair or updating processes. The one or more actions may be considered mandatory or optional.
- the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of notification for scheduling a service call.
- the vehicle can also transmit confirmations, status, or notifications as requested or if the vehicle is preconfigured to transmit confirmation, status or notification communications. This can include the generation of interfaces on the vehicle, mobile devices allows for the pre-population of service request forms or descriptive information that allows for scheduling of service requests and the like.
- the vehicles 110 may initiate the vehicle directive.
- the vehicles 110 by processing the directives, categorizes the directives based on priority, type of required action (e.g., mandatory, optional, urgent, etc.), etc.
- the vehicles 110 may further provide one or more instruction or recommendations to the vehicle owner or driver based on the processing result of the directives.
- one or more vehicles can provide the supplement vehicle data, which can include VIN data or other identification as described above.
- the network service processes the received supplemental data.
- the additional information can include vehicle VIN information or other identifiers that allow the service provider to conduct further processing to identify corrective actions or other servicing responsive to identified selection criteria. For example, the service provider can determine service records, parts ordering, previous failure/error reporting and the like.
- the sendee provider can identify any remaining vehicle VINs (within the subset that have responded to the vehicle directive and that have not implemented the corrective actions or other servicing and transmit a request for additional corrective actions at (4) and (5).
- the receiving vehicles are notified or issued responsive commands. Additionally, service technicians can also be provided notifications regarding the suggested corrective actions. For example, parts may be pre-ordered at a predetermined service provider. Accordingly, each individual vehicle with common diagnostic attributes can be serviced or provided the additional corrective or supplemental actions.
- FIG. 7 an illustrative interaction of an alternative embodiment between the network service 120 and a computing device 130 for transmission of vehicle directives according to one or more pseudonymous identifiers will be described.
- the present application is not limited to any particular number of vehicle 110 and computing device 130 interacting with the individual vehicles 110 and the network service 120 will be a relatively large scale including and exceeding thousands of individual vehicles.
- the processes of (1) - (4) as described in FIG. 6A can be used in FIG. 7.
- the computing device 130 may request the posted vehicle directives with list of pseudonym identifiers.
- the computing device 130 do not need to be configured to transmit the request at the same time.
- the transmission of the request can be randomized or implemented with a range of times (e.g., anytime throughout a day) such that the transmission of requests can be distributed in a manner to lessen the requirements for network processing resources by the network service 120.
- the network service 120 can respond individually to each request. In one embodiment, the network service 120 can provide the published/posted vehicle directives and associated set of pseudonymous identifiers.
- This approach requires the vehicle 110 to be able to match a pseudonymous identifier with the list of pseudonymous identifiers.
- the computing device 130 may transmit the pseudonymous identifier(s) of interest, and the network service 120 can then determine whether a match occurs. The network service 120 can then respond with a notification or confirmation. This embodiment can minimize the amount of data transmitted between the network service 120 and the computing device 130 and also reduce the impact on the computing device’s 130 processing resources to process a list to identify potential matches.
- the computing device 130 can collect and process the published/posted vehicle directives and associated set of pseudonymous identifiers. As described above, the computing device 130 processes the published/posted vehicle directives and associated set of pseudonymous identifiers by attempting to match the vehicle’s specific pseudonymous identifier with any of the pseudonymous identifiers includes associated with the vehicle directive. If the computing device 130 does not match the vehicle’s specific pseudonymous identifier, the vehicle directive can be disregarded. Alternatively , as illustrated m FIG . 7, for a subset of vehicles matching a pseudonymous identifier, the computing device 130 can initiate or otherwise process the vehicle directive.
- the initiation of the vehicle directive can elicit a number of responsive actions by the computing device 130. in response, such as diagnostic, repair, or updating processes.
- the one or more actions may be considered mandatory or optional.
- the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of a notification for scheduling a service call.
- the vehicle can also transmit confirmations, status, or notifications as request or if the vehicle is preconfigured to transmit confirmation, status, or notification communications.
- the computing device 130 may initiate the vehicle directive.
- the computing device 130 by processing the directives, categorizes the directives based on priority’, type of required action (e.g., mandatory, optional, urgent, etc.), etc.
- the computing device 130 may further provide one or more instructions or recommendations to the vehicle owner or driver based on the processing result of the directives.
- the computing device 130 may synchronize the vehicle data, such as updated vehicle data based on processing the directives, with the vehicle 1 10.
- both vehicle 110 and computing device 130 may respond to the directives posted by the network service 120.
- the network service 120 may establish the initial communication path between the vehicle and the network service based on criteria.
- the criteria can be based on the timing of the response received at the network sendee 120 (such as network request component 358). For example, if the network request component 358 receives a response from the vehicle before the computing device, the network request component 358 may establish the initial communication path between the vehicle and the network service.
- the criteria also can be based on network performance monitoring results. For example, the network request component 358 may compare the network performances of the network connection with the vehicle and computing device.
- Routine 800 is illustratively implemented by the management component 210 implemented in the vehicle 110.
- the processes illustrated in FIG. 8 are illustrative in nature and should not be construed as limiting. can generate or configure pseudonymous identifier(s) that will be utilized to identify the vehicle 110 by the network sendee 120.
- the pseudonymous identifier can correspond to any one of a variety of unique or semi-unique identifier.
- the pseudonymous identifier may be based on attributes of the vehicle 110, such as the representation of specific hardware or software components.
- a pseudonymous identifier may be selected from a list of available pseudonymous identifiers, such as random selection.
- the generation or configuration of the pseudonymous identifier(s) may take place at the time of manufacture, release from the manufacturer, and the like.
- the vehicle 110 can store the pseudonymous identifiers in a local memory’ for use in communications.
- the pseudonymous identifies may be associated with encryption mechanisms or other security mechanism to prevent modification or corruption of the pseudonymous identifier by a user or external service.
- the individual vehicles 110 can transmit the generated pseudonym with the network service 120 (such as vehicle data service 122).
- This process illustrates the first instantiation of the transmission of pseudonymous identifiers between the vehicles 110 and the network sendee 120.
- a vehicle 110 may be triggered to register with the network service 120 at various times or in response to triggering criteria, such as the delivery of the vehicle to a new' owner.
- the timing of transmission of the pseudonym may be based on a seed value, such as a randomly generated number, so that the transmission of the pseudonyms does not closely relate to the delivery of the vehicle or timing of the generation of the pseudonym.
- routine 800 can be ended.
- Routine 900 is illustratively implemented by the management component 210 implemented in the vehicle 110.
- the processes illustrated in FIG. 9 are illustrative in nature and should not be construed as limiting.
- the vehicles 110 can collect vehicle data.
- the vehicles include a plurality of sensors, components, and data stores for obtaining, generating, and maintaining vehicle data, including operational data.
- the collection and processing of vehicle data may be based on programed service (not illustrated).
- the vehicle 110 can associate the previously stored pseudonymous identifiers maintained in a local memory.
- the pseudonymous identifies and vehicle data may be associated with encryption mechanisms or other security mechanism to prevent modification or corruption of the pseudonymous identifier by a user or external service.
- one or more of the vehicles 110 may synchronize the vehicle data with the computing device 130.
- the synchronization can be performed periodically or in real time.
- a part of data can be synchronized with the computing device 130.
- the part of data can be defined or designated by a user, vehicle manufacturer, vehicle administrator, etc.
- the computing device 130 only get synchronized vehicle data related to engine oil management data.
- the computing device 130 may directly transmit the engine oil management data to the network service 120 by associating the data with the vehicle’s pseudonymous identifier.
- the process (3) can be an optional process.
- the individual vehicles can transmit vehicle data with the generated pseudonymous identifiers to the network sendee.
- the collection and transmission of vehicle data with associated pseudonymous identifiers can correspond to multiple transmissions. These transmissions may be scheduled on an individual vehicle basis or for groups of vehicles.
- the transmissions are illustrated as being transmitted in parallel, a vehicle may be triggered to transmit vehicle data to the network service at various times or in response to triggering criteria, such as experiencing errors, specific sensor values, accumulation of threshold amounts of vehicle data, changes in vehicle data values, and the like.
- the computing device 130 can transmit the synchronized vehicle data to the network service 120.
- the computing device 130 and vehicle 110 can be periodically synchronized the vehicle data by utilizing the network 160, such as a short range data communication network.
- the network 160 such as a short range data communication network.
- the routine 900 can be ended at block 906.
- Routine 1000 is illustratively implemented by the management component 210 implemented in the vehicle 110.
- the processes illustrated in FIG. 10 are illustrative in nature and should not be construed as limiting.
- the individual vehicles 110 request the posted vehicle directives with list of pseudonym identifiers.
- the individual vehicles do not need to be configured to transmit the request at the same time.
- the transmission of the request can be randomized or implemented with a range of times (e.g., anytime throughout a day) such that the transmission of requests can be distributed in a manner to lessen the requirements for network processing resources by the network service 120.
- the vehicles 110 can receive the published/posted vehicle directives and associated set of pseudonymous identifiers.
- the vehicles 110 processes the published/posted vehicle directives and associated set of pseudonymous identifiers by attempting to match the vehicle’s specific pseudonymous identifier with any of the pseudonymous identifiers includes associated with the vehicle directive. If the vehicle does not match the vehicle’s specific pseudonymous identifier, the routine 1000 can be ended at block 1010, and the vehicle directive can be disregarded. If the vehicle match the vehicle’s specific pseudonymous identifier, the routine continues to block 1008.
- the vehicle 110 can initiate or otherwise process the vehicle directive.
- the initiation of the vehicle directive can elicit a number of responsive actions by the vehicle 110.
- directives can include commands that are executed by the vehicle in response, such as diagnostics, repairs, or updating processes. One or more actions may be considered mandatory or optional.
- the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as generation of notification for scheduling a service call.
- the vehicle can also transmit confirmations, status, or notifications as requested or if the vehicle is preconfigured to transmit confirmation, status, or notification communications embodiments, the vehicles 110, by processing the directives, categorizes the directives based on priority, type of required action (e.g., mandatory , optional, urgent, etc.), etc.
- the vehicles 110 may further provide one or more instructions or recommendations to the vehicle owner or driver based on the processing result of the directives.
- Routine 1100 is illustratively implemented by the vehicle data service 122 implemented in the network service 120.
- the processes illustrated in FIG. 10 are illustrative in nature and should not be construed as limiting.
- the network service 120 receives a request for issuance of a vehicle directive by pseudonym.
- a vehicle directive corresponds to one or more actions and associated parameters that will be elicited by a vehicle upon receipt.
- directives can include commands that are executed by the vehicle in response, such as diagnostic, repair or updating processes.
- One or more actions may be considered mandatory or optional.
- the vehicle directives can include requests to elicit behavior by a vehicle owner/user, such as the generation of notification for scheduling a service call.
- the vehicle directives can include requests/ commands for transmission of additional or supplemental vehicle data to the network service 120 or a third party.
- the vehicle directive can include the transmission of identification information for a particular vehicle (e.g., VIN) and specific operational parameters that can utilize for subsequent actions by the network sendee 120.
- the pseudonymous identifi er may be omi tied such that the network service 120 cannot associate the supplemental ⁇ provided vehicle identifiers with the pseudonymous identifier.
- the vehicle directive may include a list of specific vehicles that the network sendee 120 is interested in tracking as a subset of pseudonymous identifiers. Accordingly, the vehicle directive may request a return of a pseudonymous identifier in response to a matching VIN. In this regard, if the subset of pseudonymous identifiers is sufficiently large, the service provider will not be able to determmatively associate any particular VIN to a pseudonymous identifier.
- the network service 120 can process (or receive requests to process) the stored vehicle data by pseudonym.
- the network be implemented by vehicles 110 associated with the pseudonymous identifiers.
- the network service 120 can implement diagnostic processes that identify potential hardware or software errors/failures indicated by the collected vehicle data.
- the network service 120 can utilize processing techniques that facilitate the grouping or organization of sets of vehicles 110 based on vehicle data, such as operational parameters, vehicle attributes, regions of operations, characterizations of use, and the like.
- the processing of the stored vehicle data may be omitted or implemented as a separate process and is not required herein.
- the network service 120 processes the vehicle directive request.
- the network service 120 can validate that the request for vehicle data is permitted, such as via authentication or authorization mechanisms.
- the received request may not explicitly identify the pseudonymous identifiers of interest but provides selection criteria (e.g., all vehicles having a mileage exceeding 100,000 miles).
- the network service 120 can query' the stored vehicle data to identify the appropriate pseudonymous identifiers correlated to the selection criteria.
- selection criteria result in a set of pseudonymous identifiers that do not exceed a size threshold
- the network sendee 120 can reject the request, ask for additional criteria or include additional pseudonymous identifiers to the set.
- having a set of pseudonymous identifiers exceeding one or more thresholds can mitigate the potential network service 120, individual or third party can iteratively match a VIN or other identification information with a specific pseudonymous identifier.
- the network sendee 120 (“the prognostication component 360) can prognosticate the vehicles, based on processing the vehicle data, received from the plurality of vehicles 110.
- the prognostication component 360 process the individual vehicle’s data and provide prognostication results. For example, if an individual vehicle data is indicating that the number of wheel spin in the vehicle is higher than other similar vehicles, the prognostication component 360 may prognosticate that the vehicle may need to rotate the tire or change tires wither shorter period than other similar vehicles.
- the prognostication result can be provided to the vehicle user (e.g., owner, driver, administrator, etc.) as directives associated with the vehicle’s pseudonymous identifier.
- the prognostication component 360 may provide a recommendation, such as to check the vehicle interior light before leaving the vehicle.
- the prognostication component 360 can perform the prognostication based on criteria.
- the criteria can be a number of vehicles having similar or same issues in their vehicle data.
- the prognostication component 360 may collect 100 vehicles having issues related to the 12V battery.
- the prognostication component 360 may prioritize the groups.
- the prognostication component 360 may prioritize a group of vehicles having issues related to safety’ as a high priority’ group than other groups of vehicles having issues with vehicle’s convenient feature. For example, a group of vehicles having issues with brake will have a higher priority’ than another group of vehicle having an issue with a heater.
- the priority also can be based on number of vehicles in the group.
- prognostication component 360 may monitor the vehicle data of the vehicles in the group. In this embodiment, if one or more vehicles’ data indicates an urgent corrective action, the prognostication component 360 may provide the prognostication results to the vehicle user, even though group does not meet the grouping criteria that triggers the prognostication. For example, if a group of vehicles are related with a brake and that one of the vehicle in the group has an brake failure, the prognostication component 360 may provide the prognostication results to the user of the vehicles in the group, even though the group does not meet the grouping criteria.
- the number of vehicles in the grouping criteria and the criteria for prioritizing the groups are not limited in present application, and the number of vehicles and the prioritizing criteria can be determined based on specific application.
- the network service 120 can perform the prognostication of the plurality of vehicles.
- the machine learned component 362 monitors vehicle data of the plurality of vehicles, such as the vehicle data batch.
- the machine learned component 362 also reviews the prognostication result data, such as prognostication batch.
- the machine learned component prognostication models can be trained by using the training models. For example, if a vehicle having an issue with the vehicle’s communication component repaired by replacing a MOSFET, the training model of the machine learned component 362 will tram the prognostication models, such that if a specific vehicle communication is failed, the corrective action is diagnosing the MOSFET in the vehicle communication circuitry .
- the network service 120 can respond individually to each request.
- the network service 120 can provide the published/ posted vehicle directives and associated set of pseudonymous identifiers. This can include an identification of the full list of pseudonymous identifiers or some sorted/filtered subset of pseudonymous identifiers. This approach requires the vehicle 110 to be able to match a pseudonymous identifier with the list of pseudonymous identifiers.
- the network service 120 can receive selected responses to posted pseudonym directive request.
- the vehicle 110 may transmit the pseudonymous identifier(s) of interest, and the network sendee 120 can then determine whether a match occurs.
- the network service 120 can then respond with a notification or confirmation. This embodiment can minimize the amount of data transmitted between the network sendee 120 and the vehicle and also reduce the impact on the vehicle’s processing resources to process a list to identify potential matches.
- the network service 120 can process the received selected responses to post the vehicle directive request that identifies a set of pseudonymous identifiers that have been requested to implement the directive request.
- the network service 120 does not need to actively transmit the vehicle directive requests to each vehicle or include processing mechanisms that specifically identify contact mechanisms (e.g., network addresses) for each pseudonymous identifier. Rather, individual vehicles wall independently contact the network sendee 120 for the published list of pseudonymous identifiers and vehicle directives.
- the routine 1100 can be ended at block 1112.
- Various embodiments of the present disclosure may be a system, a method, and/or a computer program product at any possible technical detail level of integration
- the computer program product may include a computer readable storage medium (or mediums) aspects of the present disclosure.
- the functionality described herein may be performed as software instructions are executed by, and/or in response to software instructions being executed by, one or more hardware processors and/or any other suitable computing devices.
- the software instructions and/or other executable code may be read from a computer readable storage medium (or mediums).
- the computer readable storage medium can be a tangible device that can retain and store data and/or instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device (including any volatile and/or non-volatile electronic storage devices), a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a solid state drive, a random access memory (RAM), a read-only memory?
- ROM read-only memory
- EPROM erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- a computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processmg devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions (also referred to herein as, for example, “code,” “instructions,” “module,” “application,” “software application,” and/or the like) for carrying out operations of the present disclosure may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, configuration data for integrated circuitry, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++, or the like, and procedural programming languages, such as the “C” programming language or similar programming languages.
- Computer readable program instructions may be callable from other instructions or from itself, and/or may be invoked in response to detected actions or interrupts.
- Computer readable program instructions configured for execution on computing devices may be provided on a computer readable storage medium, and/or as a digital download (and may be originally stored in a compressed or installable format that requires installation, decompression or decryption prior to execution) that may then be stored on a computer readable storage medium.
- Such computer readable program instructions may be stored, partially or fully, on a memory device (e.g,, a computer readable storage medium) of the executing computing device, for execution by the computing device.
- the computer readable program instructions may execute entirely on a user’s computer (e.g., the executing computing device), partly on the user’s computer, as a stand-alone software package, partly on the user’s computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user’s computer through any type of network, including a local area network (LAN) or a wide area network (W AN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present disclosure.
- These computer readable program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowcharts) and/or block diagram(s) block or blocks.
- the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer.
- the remote computer may load the instructions and/or modules into its dynamic memory and send the instructions over a telephone, cable, or optical line using a modem.
- a modem local to a server computing system may receive the data on the telephone/cable/optical line and use a converter device including the appropriate circuitry to place the data on a bus.
- the bus may carry the data to a memory, from which a processor may retrieve and execute the instructions.
- the instructions received by the memory may optionally be stored on a storage device (e.g., a solid-state drive) either before or after execution by the computer processor.
- a storage device e.g., a solid-state drive
- the functions noted in the blocks may occur out of the order noted in the Figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality’ involved.
- certain blocks may be omitted in some implementations.
- the methods and processes described herein are also not limited to any’ particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate.
- application-specific processors e.g., application-specific integrated circuits (ASICs)
- programmable processors e.g., field programmable gate arrays (FPGAs)
- application-specific circuitry any of which may also combine custom hard-wired logic, logic circuits, ASICs, FPGAs, etc. with custom programming/execution of software instructions to accomplish the techniques.
- any of the above-mentioned processors, and/or devices incorporating any of the above-mentioned processors may be referred to herein as, for example, “computers,” “computer devices,” “computing devices,” “hardware computing devices,” “hardware processors,” “processing units,” and/or the like.
- Computing devices of the aboveembodiments may generally (but not necessarily) be controlled and/or coordinated by operating system software, such as Mac OS, iOS, Android, Chrome OS, Windows OS (e.g., Window’s XP, Windows Vista, Windows 7, Windows 8, Windows 10, Window’s Server, etc. ), operating systems.
- the computing devices may be controlled by a proprietary operating system.
- Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface functionality, such as a graphical user interface (“GUI”), among other things.
- GUI graphical user interface
- certain functionality may be accessible by a user through a web-based viewer (such as a web browser), or other suitable software program.
- the user interface may be generated by a server computing system and transmitted to a web browser of the user (e.g., running on the user’s computing system).
- data e.g., user interface data
- the user interface may be generated (e.g., the user interface data may be executed by a browser accessing a web service and may be configured to render the user interfaces based on the user interface data).
- the user may then interact with the user interface through the web-browser.
- User interfaces of certain implementations may be accessible through one or more dedicated software applications.
- one or more of the computing devices and/or systems of the disclosure may include mobile computing devices, and user interfaces may be accessible through such mobile computing devices (for example, smartphones and/or tablets),
- Conditional language such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used. may not include, certain features, elements, and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
- Conjunctive language such as the phrase “at least one of X, Y, and Z,” or “at least one of X, Y, or Z,” unless specifically stated otherwise, is to be understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z, or a combination thereof.
- the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list.
- such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Software Systems (AREA)
- Primary Health Care (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Mathematical Physics (AREA)
- Medical Informatics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Traffic Control Systems (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280079045.5A CN118355398A (en) | 2021-10-21 | 2022-10-20 | Vehicle prediction using kana logs and instructions |
EP22814227.9A EP4420067A1 (en) | 2021-10-21 | 2022-10-20 | Vehicle prognostics utilizing psuedonymous logging and directives |
KR1020247015529A KR20240093554A (en) | 2021-10-21 | 2022-10-20 | Vehicle prognoses using pseudonym logging and directives |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202163262856P | 2021-10-21 | 2021-10-21 | |
US63/262,856 | 2021-10-21 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2023069635A1 true WO2023069635A1 (en) | 2023-04-27 |
WO2023069635A9 WO2023069635A9 (en) | 2024-07-18 |
Family
ID=84365492
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2022/047300 WO2023069635A1 (en) | 2021-10-21 | 2022-10-20 | Vehicle prognostics utilizing psuedonymous logging and directives |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4420067A1 (en) |
KR (1) | KR20240093554A (en) |
CN (1) | CN118355398A (en) |
WO (1) | WO2023069635A1 (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200029210A1 (en) * | 2019-09-27 | 2020-01-23 | Rafael Rasales | Securing vehicle privacy in a driving infrastructure |
-
2022
- 2022-10-20 EP EP22814227.9A patent/EP4420067A1/en active Pending
- 2022-10-20 WO PCT/US2022/047300 patent/WO2023069635A1/en active Application Filing
- 2022-10-20 KR KR1020247015529A patent/KR20240093554A/en unknown
- 2022-10-20 CN CN202280079045.5A patent/CN118355398A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200029210A1 (en) * | 2019-09-27 | 2020-01-23 | Rafael Rasales | Securing vehicle privacy in a driving infrastructure |
Non-Patent Citations (1)
Title |
---|
SIEGEL JOSHUA ERIC: "Data Proxies, the Cognitive Layer, and Application Locality: Enablers of Cloud-Connected Vehicles and Next-Generation Internet of Things", MASSACHUSETTS INSTITUTE OF TECHNOLOGY, 1 June 2016 (2016-06-01), XP055917329, Retrieved from the Internet <URL:https://dspace.mit.edu/bitstream/handle/1721.1/104456/958278459-MIT.pdf?sequence=1&isAllowed=y> [retrieved on 20220503] * |
Also Published As
Publication number | Publication date |
---|---|
WO2023069635A9 (en) | 2024-07-18 |
KR20240093554A (en) | 2024-06-24 |
CN118355398A (en) | 2024-07-16 |
EP4420067A1 (en) | 2024-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11875144B2 (en) | Over-the-air (OTA) mobility services platform | |
US11341786B1 (en) | Dynamic delivery of vehicle event data | |
US12046085B2 (en) | System, method, and apparatus for managing vehicle data collection | |
US11132853B1 (en) | Vehicle gateway device and interactive cohort graphical user interfaces associated therewith | |
US9990781B2 (en) | Vehicle information system | |
US10375174B2 (en) | Cloud integrated vehicle platform | |
US11840244B2 (en) | System and method for detecting behavioral anomalies among fleets of connected vehicles | |
US20190101914A1 (en) | Data Processing System with Machine Learning Engine for Providing Driving Data Analysis and Vehicle Control Functions | |
US11811629B2 (en) | Synchronization of data collected by internet of things (IoT) devices | |
CN115443637A (en) | System, method and apparatus for managing vehicle data collection | |
CN109131340A (en) | Active vehicle adjusting performance based on driving behavior | |
US20220070699A1 (en) | UNIFIED MANAGEMENT AND MONITORING OF IoT NODES WITH MULTIPLE NETWORK CONNECTIONS | |
US20230114295A1 (en) | Method and system for a dynamic data collection and context-driven actions | |
US20180082342A1 (en) | Predicting automobile future value and operational costs from automobile and driver information for service and ownership decision optimization | |
US20220236729A1 (en) | Self-maintaining autonomous vehicle procedure | |
CN115836261A (en) | Fair anomaly detection and localization | |
CN117461061A (en) | Device health code broadcast over hybrid vehicle communication network | |
Lovas et al. | PaaS-oriented IoT platform with Connected Cars use cases | |
EP4420067A1 (en) | Vehicle prognostics utilizing psuedonymous logging and directives | |
JP2024540929A (en) | Vehicle programming using pseudonymous logging and commands | |
WO2023069647A1 (en) | Pseudonymous logging and directives | |
US20240203168A1 (en) | Systems and methods for automatically predicting and scheduling vehicle repairs | |
US20240311709A1 (en) | Generating and providing digital notifications from vehicle service features and transportation matching features utilizing an intelligent recommendation model | |
US20230421930A1 (en) | Technologies for reducing event notifications in telematics systems | |
JP2024540932A (en) | Pseudonymous logging and instructions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22814227 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2024523589 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022814227 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022814227 Country of ref document: EP Effective date: 20240521 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280079045.5 Country of ref document: CN |